An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)
☆24Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for firmanal
Users that are interested in firmanal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Expected edit distance implementation using OpenFst tools☆11May 13, 2015Updated 10 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,052Jul 21, 2024Updated last year
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Display bits of a binary file as pixels☆24Apr 25, 2014Updated 11 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆257Oct 29, 2023Updated 2 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 8 months ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago